Identity recoveryTestableAnonymous Identity-Based Encryption can protect privacy of the receiver. However, there are some situations that we need to re- cover the identity of the receiver, for example a dispute occurs or the privacy mechanism is abused. In this paper, we propose a new con- ...
we present a novel anonymous identity-based encryption scheme. Our scheme comes from the analysis of Boyen-Waters anonymous IBE Scheme in which we find a method to construct anonymous IBE schemes. We show that Boyen-Waters anonymous
Spatial encryption, which is a kind of functional encryption, provides a generalized framework for special property encryption schemes such as broadcast encryption, predicate encryption, forward secure encryption, (hierarchical) identity-based encryption, delegatable attribute-based encryption etc. In this ...
Certificateless encryption is used to grant user anonymity during authentication between the WBAN user and the access point. This is achieved by allowing the client to use a private key to sign a pseudo-identity, and sends this to the access point. When the access point receives the ...
a new anonymous private key sharing scheme is proposed, user private key sharing problem can be converted to the secret sharing problem for integers,a lot of bilinear pairing computations is reduced, the risk of compromising secret of the identity-based encryption scheme is reduced,the problem of...
Considerable authority ciphertext policy that prioritizes privacy Li et al. [16] developed Attribute-based encryption (ABE) to encrypt attribute data with ciphertext and track down the identity of a dishonest user who divulges the decryption key. This system was designed to track a fraudulent use...
Virtual private networks protect your data and your identity so you can roam the online world worry-free. VPNs use different standards of encryption to make sure no one can intercept your information and even if they somehow do, they can’t decipher what it says. ...
[KEYAGREEMENT]. This includes checking that the coordinates of the resulting point are in the correct range, that the point is on the curve, and that the point is not the point at infinity. Additionally, this function validates that the resulting element is not the group identity element. If...
By utilizing the identity-based encryption scheme and the identity-based batch signature scheme, the proposed scheme reduces the total number of pseudo-identities stored in a SIM card and supports batch verification at the server side to enhance authentication efficiency. In addition, the proposed ...
Pairing-Based Cryptography Library. [Online] http://crypto.stanford.edu/pbc/ Boneh D and Franklin M (2001) ‘Identity-based encryption from the Weil pairing’ in Advances in Cryptology-CRYPTO: Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, vol. 2139...